MacOS version of GIMP bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions
granted by the user to the main application bundle. An attacker with local user access can
invoke this interpreter with arbitrary commands or scripts, leveraging the
application's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of GIMP, potentially disguising attacker's malicious intent.
This issue has been fixed in 3.1.4.2 version of GIMP.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gimp
Gimp gimp |
|
Vendors & Products |
Gimp
Gimp gimp |
Mon, 11 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 11 Aug 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | MacOS version of GIMP bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle. An attacker with local user access can invoke this interpreter with arbitrary commands or scripts, leveraging the application's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of GIMP, potentially disguising attacker's malicious intent. This issue has been fixed in 3.1.4.2 version of GIMP. | |
Title | TCC Bypass via Inherited Permissions in Bundled Interpreter in GIMP.app | |
Weaknesses | CWE-276 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-08-11T12:21:48.487Z
Updated: 2025-08-11T19:45:08.822Z
Reserved: 2025-08-06T12:01:36.272Z
Link: CVE-2025-8672

Updated: 2025-08-11T19:45:05.301Z

Status : Awaiting Analysis
Published: 2025-08-11T13:15:37.880
Modified: 2025-08-11T18:32:48.867
Link: CVE-2025-8672

No data.